Skip links

Signature wrapping attack, SAP security note 1641208

Description

It is possible to add malicious content to signed xml messages and break their integrity – impersonate or manipulate data in wrong way, depending on the exposed web service.

Available fix and Supported packages

  • ENGINEAPI | 7.10 | 7.11
  • ENGINEAPI | 7.20 | 7.20
  • ENGINEAPI | 7.30 | 7.30
  • ENGINEAPI | 7.31 | 7.31
  • SAP-JEECOR | 7.00 | 7.00
  • SAP-JEECOR | 6.40 | 6.40
  • SAP-JEECOR | 7.01 | 7.02
  • ENGINEAPI 7.10 | SP010 | 000012
  • ENGINEAPI 7.10 | SP011 | 000008
  • ENGINEAPI 7.10 | SP012 | 000004
  • ENGINEAPI 7.10 | SP013 | 000001
  • ENGINEAPI 7.10 | SP014 | 000000
  • ENGINEAPI 7.11 | SP005 | 000017
  • ENGINEAPI 7.11 | SP006 | 000007
  • ENGINEAPI 7.11 | SP007 | 000005
  • ENGINEAPI 7.11 | SP008 | 000001
  • ENGINEAPI 7.11 | SP009 | 000000
  • ENGINEAPI 7.20 | SP003 | 000016
  • ENGINEAPI 7.20 | SP004 | 000011
  • ENGINEAPI 7.20 | SP005 | 000006
  • ENGINEAPI 7.20 | SP006 | 000001
  • ENGINEAPI 7.20 | SP007 | 000000
  • ENGINEAPI 7.30 | SP001 | 000008
  • ENGINEAPI 7.30 | SP002 | 000003
  • ENGINEAPI 7.30 | SP003 | 000005
  • ENGINEAPI 7.30 | SP004 | 000003
  • ENGINEAPI 7.30 | SP005 | 000001

Affected component

    BC-JAS-SEC-WSS
    Web Services Security

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1641208

TAGS

#